Security News

http://www.computerworld.com/securitytopics/security/story/0,10801,100637,00.html By Jaikumar Vijayan MARCH 25, 2005 COMPUTERWORLD A threat by Sybase Inc. to sue a U.K.-based security research...

Forwarded from: William Knowles http://www.spacedaily.com/2004/041208055632.1zik2pci.html Dec 08, 2004 - (AFP) TOKYO - Japan will set up a special unit against cyber terrorism and needs to be on...

http://www.computerworld.com/securitytopics/security/story/0,10801,98047,00.html By Jaikumar Vijayan DECEMBER 03, 2004 COMPUTERWORLD Security architectures that are designed solely to react to...

http://cryptome.org/cisco-holes.htm Thanks to A. 14 November 2004 In the SIP images of Cisco 7960/7940 (and perhaps 7970/7980) phones, there is a "telnet" option which can be enabled. In the...

http://www.computerworld.com/securitytopics/security/story/0,,93757,00.html Opinion by Mudge Intrusic Inc. JUNE 10, 2004 Six years ago, I warned the U.S. Senate that it was possible to "take down...

http://www.computerworld.com/securitytopics/security/story/0,10801,93352,00.html News Story by Jaikumar Vijayan MAY 24, 2004 COMPUTERWORLD The theft of proprietary operating system source code...

http://www.computerworld.com/securitytopics/security/story/0,10801,88109,00.html Story by Jaikumar Vijayan DECEMBER 11, 2003 COMPUTERWORLD NEW YORK -- "Zero-day" attacks that take advantage of...

http://www.computerworld.com/securitytopics/security/story/0,10801,81444,00.html By JAIKUMAR VIJAYAN MAY 22, 2003 Computerworld PHOENIX -- Growing IT and physical risks and emerging regulatory...

Forwarded from: bob http://www.computerworld.com/cwi/Printer_Friendly_Version/0,1212,NAV47_STO69924-,00.html By Jaikumar Vijayan Computer World Apr. 08, 2002 Denial-of-service (DOS) attacks...

http://www.computerworld.com/storyba/0,4125,NAV47_STO69866,00.html By DAN VERTON April 08, 2002 While cyberterrorism may not be an immediate threat, it would be foolish not to recognize that the...